AIセキュリティポータルbot

Unlocking High-Accuracy Differentially Private Image Classification through Scale

Authors: Soham De, Leonard Berrada, Jamie Hayes, Samuel L. Smith, Borja Balle | Published: 2022-04-28 | Updated: 2022-06-16
Privacy Protection Method
Model Design
Computational Efficiency

TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection

Authors: Sijia Li, Gaopeng Gou, Chang Liu, Chengshang Hou, Zhenzhen Li, Gang Xiong | Published: 2022-04-28
Cybersecurity
Network Node Configuration
Phishing Attack

An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

Authors: Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti | Published: 2022-04-27
Cybersecurity
Phishing Attack
Attack Method

Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection

Authors: Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva | Published: 2022-04-27
Watermarking
Phishing Attack
Visual Similarity Detection

Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier

Authors: Anupama Mishra | Published: 2022-04-27
Cybersecurity
Model Design
Attack Method

Federated Stochastic Primal-dual Learning with Differential Privacy

Authors: Yiwei Li, Shuai Wang, Tsung-Hui Chang, Chong-Yung Chi | Published: 2022-04-26
Privacy Protection Method
Convergence Analysis
Communication Efficiency

You Don’t Know My Favorite Color: Preventing Dialogue Representations from Revealing Speakers’ Private Personas

Authors: Haoran Li, Yangqiu Song, Lixin Fan | Published: 2022-04-26
Privacy Leakage
Loss Function
Attackers and Malicious Devices

Towards Data-Free Model Stealing in a Hard Label Setting

Authors: Sunandini Sanyal, Sravanti Addepalli, R. Venkatesh Babu | Published: 2022-04-23
Attack Methods against DFL
Query Diversity
Membership Inference

GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV

Authors: Anum Talpur, Mohan Gurusamy | Published: 2022-04-23 | Updated: 2022-09-12
Data Contamination Detection
Anomaly Detection Method
Vehicle Network Security

Towards Privacy-Preserving Neural Architecture Search

Authors: Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss | Published: 2022-04-22
Privacy Protection Method
Privacy Enhancing Technology
Model Design